Security Breach: Using AI to Stay Ahead of the Hack

Ironically, the key is making people a bigger part of key processes and plans.

I know that we’re constantly talking about artificial intelligence - the best ways to use it, the ways hackers are using it, and the overall good, bad and ugly of implementing AI into your security infrastructure.

But what if we took a little different route.

In this episode we're going to explore how AI can help make your people better at managing cybersecurity. We know there’s a huge talent pool shortage, and the challenges of keeping employees vigilant against repeated attacks continues to grow.

So, watch/listen as I explore these dynamics, well as many others, with Grant Oviatt - Head of Security Operations for Prophet Security – a company that recently unveiled their State of AI in SecOps 2025 research report. A lot of the data from the report was rather shocking, especially when the survey repeatedly uncovered how many SOCs, inundated with constant intrusion alerts, have experienced numerous breaches simply because the volume of critical alert notifications has made them easier to ignore.

It was a great conversation, with numerous takeaways, including:

  • Why 60 percent of security teams have experienced critical breaches stemming from overlooked alerts.
  • How security leaders anticipate AI solutions handling more tasks within the SOC over the next 3 years.
  • Reasons for 57 percent of organizations deliberately suppressing detection rules and accepting higher risks to keep operations moving.
  • How hackers are using AI beyond just phishing campaigns to get access to critical assets and networks.
  • How the industrial sector can better implement AI without yielding to internal pressures.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at [email protected].

More in Technology